vendor:
Kemana Directory
by:
Gjoko 'LiquidWorm' Krstic
8,8
CVSS
HIGH
Authenticated Arbitrary Code Execution
78
CWE
Product Name: Kemana Directory
Affected Version From: 1.5.6
Affected Version To: 1.5.6
Patch Exists: NO
Related CWE: N/A
CPE: a:c97net:kemana_directory:1.5.6
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Apache/2.4.7 (Win32), PHP/5.5.6, MySQL 5.6.14
2014
Kemana Directory 1.5.6 Remote Code Execution
Kemana Directory suffers from an authenticated arbitrary code execution. The vulnerability is caused due to the improper verification of uploaded files in several modules thru several POST parameters. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP script file that will be stored in '/public/image' directory.
Mitigation:
Minimum permissions needed for a user to upload any file: User level: Regular (param: user_level=1) Admin level: Editor (param: admin_level=3) Only the 'Super Admin' level makes the Tool 'File Manager' available.